## Test that parsing of an invalid XCOFF traceback table with a too ## big function name length causes an out of range error. # RUN: yaml2obj %s -o %t.o # RUN: llvm-objdump -d --traceback-table --symbol-description %t.o 2>&1 | \ # RUN: FileCheck -DFILE=%t.o --implicit-check-not="warning:" --check-prefixes=WARN %s --- !XCOFF FileHeader: MagicNumber: 0x1DF Sections: - Name: .text Flags: [ STYP_TEXT ] SectionData: "4e8000200000000000002240800102075a000000000000880073666f6f0000000000000000000000" Symbols: - Name: .AddNum Value: 0 Section: .text Type: 0x20 StorageClass: C_EXT AuxEntries: - Type: AUX_CSECT SectionOrLength: 0x28 SymbolAlignmentAndType: 0x21 StorageMappingClass: XMC_PR # WARN: warning: '[[FILE]]': failure parsing traceback table with address: 0x4 # WARN-NEXT: >>> unexpected end of data at offset 0x24 while reading [0x12, 0x85) # WARN-NEXT: >>> Raw traceback table data is: # WARN-NEXT: 8: 00 00 22 40 # WARN-NEXT: c: 80 01 02 07 # WARN-NEXT: 10: 5a 00 00 00 # WARN-NEXT: 14: 00 00 00 88 # WARN-NEXT: 18: 00 73 66 6f # WARN-NEXT: 1c: 6f 00 00 00 # WARN-NEXT: ...